Re: [openssl.org #3120] Minimum size of DH

2014-03-30 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 07:44:53PM +0100, Dr. Stephen Henson wrote: Certainly. Nothing is set in stone at this stage. It's only part of the master branch and wont appear in a release for a while yet. [...] Yes I'm aware of some of the problems here. I do want OpenSSL to reject attempts

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Dr. Stephen Henson
On Fri, Mar 14, 2014, Nikos Mavrogiannopoulos wrote: On Thu, 2014-03-13 at 22:52 +0100, Stephen Henson via RT wrote: On Thu Mar 13 20:12:38 2014, d...@fifthhorseman.net wrote: This is a hard-coded patch to make OpenSSL clients reject connections which use DHE handshakes with 1024 bits.

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 05:57:42PM +0100, Dr. Stephen Henson wrote: In the new Fedora we will try system-wide configuration parameters for all crypto libraries (patch [0] was along that line), so such a change is very good news. It would be nice if that branch was public for comments or

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Dr. Stephen Henson
On Fri, Mar 28, 2014, Viktor Dukhovni wrote: On Fri, Mar 28, 2014 at 05:57:42PM +0100, Dr. Stephen Henson wrote: In the new Fedora we will try system-wide configuration parameters for all crypto libraries (patch [0] was along that line), so such a change is very good news. It would be

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Dr. Stephen Henson
On Fri, Mar 28, 2014, Dr. Stephen Henson wrote: On Fri, Mar 28, 2014, Viktor Dukhovni wrote: On Fri, Mar 28, 2014 at 05:57:42PM +0100, Dr. Stephen Henson wrote: In the new Fedora we will try system-wide configuration parameters for all crypto libraries (patch [0] was along that

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 06:57:34PM +0100, Dr. Stephen Henson wrote: Well what goes in each security level is up for discussion and can be changed. So perhaps session tickets can be allowed at somewhat higher levels? As you note level 2 and higher general will have problems with today's

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 07:27:59PM +0100, Dr. Stephen Henson wrote: One possibility I'd considered is to move levels 1 and above along one. Then you'd have... Level 0: anything goes. Level 1: almost anything goes but stupid stuff like DH, RSA keys 512 bits excluded. And the corresponding

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Dr. Stephen Henson
On Fri, Mar 28, 2014, Viktor Dukhovni wrote: On Fri, Mar 28, 2014 at 06:57:34PM +0100, Dr. Stephen Henson wrote: Well what goes in each security level is up for discussion and can be changed. So perhaps session tickets can be allowed at somewhat higher levels? Certainly. Nothing is

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Dr. Stephen Henson
On Fri, Mar 28, 2014, Viktor Dukhovni wrote: On Fri, Mar 28, 2014 at 07:27:59PM +0100, Dr. Stephen Henson wrote: One possibility I'd considered is to move levels 1 and above along one. Then you'd have... Level 0: anything goes. Level 1: almost anything goes but stupid stuff like DH,

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 07:44:53PM +0100, Dr. Stephen Henson wrote: What are your thoughts on level 1? Do you think those requirements are reasonable? Currently (subject to change!) level 1 is the default level. I am not personally aware of any interoperability obstacles to the proposed level

Re: [openssl.org #3120] Minimum size of DH

2014-03-28 Thread Viktor Dukhovni
On Fri, Mar 28, 2014 at 08:00:06PM +0100, Dr. Stephen Henson wrote: Therefore, implementations can over time move to encrypt session tickets with 256-bit keys. So I would not exclude session tickets at any of the security levels, this adds no security, but makes the use of security less

Re: [openssl.org #3120] Minimum size of DH

2014-03-14 Thread Nikos Mavrogiannopoulos
On Thu, 2014-03-13 at 22:52 +0100, Stephen Henson via RT wrote: On Thu Mar 13 20:12:38 2014, d...@fifthhorseman.net wrote: This is a hard-coded patch to make OpenSSL clients reject connections which use DHE handshakes with 1024 bits. I should've commented on this before, sorry. I'm

[openssl.org #3120] Minimum size of DH

2014-03-13 Thread Stephen Henson via RT
On Thu Mar 13 20:12:38 2014, d...@fifthhorseman.net wrote: This is a hard-coded patch to make OpenSSL clients reject connections which use DHE handshakes with 1024 bits. I should've commented on this before, sorry. I'm currently working on a framework where several security parameters can be

Re: [openssl.org #3120] Minimum size of DH

2014-03-13 Thread Daniel Kahn Gillmor via RT
On 03/13/2014 05:52 PM, Stephen Henson via RT wrote: I should've commented on this before, sorry. I'm currently working on a framework where several security parameters can be configured at both compile time and runtime, including DH parameter sizes. It's still under development at present

RE: [openssl.org #3120] Minimum size of DH

2013-09-02 Thread Dave Thompson
From: owner-openssl-...@openssl.org On Behalf Of Kurt Roeckx via RT Sent: Saturday, 31 August, 2013 12:54 It seems that s_server by default use 512 bit for the DHE if it's not specified, and s_client just accepts that. Is there a way to set a minimum size? I think think 512 really is too

[openssl.org #3120] Minimum size of DH

2013-08-31 Thread Kurt Roeckx via RT
It seems that s_server by default use 512 bit for the DHE if it's not specified, and s_client just accepts that. Is there a way to set a minimum size? I think think 512 really is too short and shouldn't be accepted by any client. I think we should have a minimum of 1024. Kurt